HOME > 상세정보

상세정보

Security for ubiquitous computing

Security for ubiquitous computing (10회 대출)

자료유형
단행본
개인저자
Stajano, Frank.
서명 / 저자사항
Security for ubiquitous computing / Frank Stajano.
발행사항
West Sussex, England ; :   J. Wiley Sons,   2002.  
형태사항
xix, 247 p. : ill. ; 25 cm.
총서사항
Wiley series in communications networking distributed systems
ISBN
0470844930 (alk. paper)
서지주기
Includes bibliographical references (p. 204-243) and index.
일반주제명
Computer networks -- Security measures.
000 00847camuu2200241 a 4500
001 000000798020
005 20100920134959
008 011130s2002 enka b 001 0 eng
010 ▼a 1055938
020 ▼a 0470844930 (alk. paper)
040 ▼a DLC ▼c DLC ▼d UKM ▼d C#P ▼d 211009 ▼d 244002
042 ▼a pcc
050 0 0 ▼a TK5105.59 ▼b .S7 2002
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b S7822s
100 1 ▼a Stajano, Frank.
245 1 0 ▼a Security for ubiquitous computing / ▼c Frank Stajano.
260 ▼a West Sussex, England ; : ▼b J. Wiley Sons, ▼c 2002.
300 ▼a xix, 247 p. : ▼b ill. ; ▼c 25 cm.
440 0 ▼a Wiley series in communications networking distributed systems
504 ▼a Includes bibliographical references (p. 204-243) and index.
650 0 ▼a Computer networks ▼x Security measures.

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 S7822s 등록번호 111229050 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 2 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 S7822s 등록번호 121079698 (8회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 3 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 S7822s 등록번호 151233511 도서상태 대출가능 반납예정일 예약 서비스 B M ?
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/서고6층/ 청구기호 005.8 S7822s 등록번호 111229050 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 S7822s 등록번호 121079698 (8회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M
No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 S7822s 등록번호 151233511 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

* Ubiquitous computing refers to computers embedded in everyday devices communicating with each other over ad-hoc wireless networks
* Focuses on two very hot topics: ad-hoc wireless networking and security
* Covers security issues for well-established and widely used technologies such as GSM, Bluetooth, and IP
* Presents a framework to make sense of the many and varied issues at stake, a taxonomy of the major problems and in-depth discussion of some specific, cutting-edge solutions
* Includes a primer on security and the basics of cryptography
* Describes the security issues in "peer-to-peer networking," a new technology that is gaining prominence in the media with applications such as Napster and ICQ Chat

Computer sind allgegenwartige Begleiter unseres Alltags - in Telefonen, Waschmaschinen, Fernsehgeraten, Heizungssystemen, Smart Cards und vielen anderen Geraten. In diesem Buch wird beschrieben, wie alle diese Systeme uber drahtlose Netzwerke miteinander kommunizieren konnen. Insbesondere wird auf die derzeit entwickelten Techniken und Protokolle eingegangen, mit denen sich absichern laßt, daß die Systeme vor unberechtigtem Zugriff geschutzt sind und die Daten den richtigen Empfanger erreichen. Dieser Band ist weder ein "Kochbuch" mit Anleitungen zur Implementierung noch ein enzyklopadisches Handbuch. Es bietet Ihnen vielmehr einen Rahmen zum Verstandnis der Technologie, eine Kategorisierung der wichtigsten Probleme und eine tiefgrundige Diskussion einiger spezifischer Losungen. Nutzlich ist die allgemeine, gut verstandliche Einfuhrung in die Sicherheitstechnik und die Grundlagen der Kryptographie.


New feature

Ubiquitous computing (ubicomp) is about networked microprocessors embedded in everyday objects: not just cellphones and home appliances but also books, bookshelves, bus stops and bathtubs. This future is closer than you might imagine.

The insecurity of networked PCs is notorious. If we deployed ubicomp systems as vulnerable as PCs, the risks for society would be catastrophic. How can we do better, and what are the new problems? In a very accessible style, this book provides a coherent framework to make sense of the many issues at stake.

Features include:
* An introduction to the state of the art in ubicomp research.
* A readable primer on security and cryptology.
* An up-to-date technical treatment of ubicomp security, including a sceptical look at Bluetooth and 802.11.
* "Peer-to-peer" and ad-hoc networking.
* An in-depth discussion of specific, cutting-edge solutions.
* An extensively annotated bibliography.
Security for Ubiquitous Computing combines clarity, brevity and authority. It will appeal to developers and researchers in ubiquitous computing, wireless and ad-hoc networking, wearable computing and related areas. Because it is readable and self-contained, it will also prove valuable to managers, analysts, technology watchers and end users who want to understand the new opportunities and risks of ubicomp.


정보제공 : Aladin

목차

About the Author.

Forward.

Preface.

Acknowledgements.

Contact Information.

1. Introduction.

Scenario.

Essential terminology.

Problems.

Notation.

2. Ubiquitous computing.

Xerox PARC.

Norman's Invisible Computer.

MIT.

HP's Cooltown.

ORL/AT&T Labs Cambridge.

Security issues.

3. Computer security.

Confidentiality.

Integrity.

Availability.

Authentication.

Security policies.

4. Authentication.

New preconditions.

The Resurrecting Duckling security policy model.

The many ways of being a master.

5. Confidentiality.

Cryptographic primitives for peanut processors.

Personal privacy.

6. Integrity.

Message integrity.

Device integrity.

7. Availability.

Threats to the communications channel.

Threats to the battery energy.

Threats from mobile code.

8. Anonymity.

The Cocaine Auction Protocol.

The anonymity layer.

9. Conclusions.

Appendix A: A Short Primer on Functions.

Appendix B: Existing Network Security Solutions.


Annotated bibliography.

Index.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)